首页 > 最新文献

ICST Transactions on Scalable Information Systems最新文献

英文 中文
Detecting Fake Social Media Profiles Using the Majority Voting Approach 利用多数投票法检测虚假社交媒体资料
Pub Date : 2024-02-14 DOI: 10.4108/eetsis.4264
Dharmaraj R Patil, T. Pattewar, Vipul D. Punjabi, Shailendra M. Pardeshi
INTRODUCTION: The rise of social media platforms has brought about a concerning surge in the creation of fraudulent user profiles, with intentions ranging from spreading false information and perpetrating fraud to engaging in cyberbullying. The detection of these deceptive profiles has emerged as a critical imperative to safeguard the trustworthiness and security of online communities.OBJECTIVES: This paper focused on the detection and identification of fake social media profiles.METHODS: This paper introduces an innovative approach for discerning and categorizing counterfeit social media profiles by leveraging the majority voting approach. The proposed methodology integrates a range of machine learning algorithms, including Decision Trees, XGBoost, Random Forest, Extra Trees, Logistic Regression, AdaBoost and K-Nearest Neighbors each tailored to capture distinct facets of user behavior and profile attributes. This amalgamation of diverse methods results in an ensemble of classifiers, which are subsequently subjected to a majority voting mechanism to render a conclusive judgment regarding the legitimacy of a given social media profile.RESULTS: We conducted thorough experiments using a dataset containing both legitimate and fake social media profiles to determine the efficiency of our methodology. Our findings substantiate that the Majority Voting Technique surpasses individual classifiers, attaining an accuracy rate of 99.12%, a precision rate of 99.12%, a recall rate of 99.12%, and an F1-score of 99.12%.CONCLUSION: The results show that the majority vote method is reliable for detecting and recognising fake social media profiles.
引言:随着社交媒体平台的兴起,创建虚假用户配置文件的现象激增,其意图从传播虚假信息、实施欺诈到参与网络欺凌,令人担忧。要保障网络社区的可信度和安全性,检测这些欺骗性档案已成为当务之急:方法:本文介绍了一种创新方法,利用多数投票法对假冒社交媒体资料进行辨别和分类。所提出的方法整合了一系列机器学习算法,包括决策树、XGBoost、随机森林、额外树、逻辑回归、AdaBoost 和 K-Nearest Neighbors,每种算法都是为捕捉用户行为和个人资料属性的不同方面而量身定制的。结果:我们使用包含合法和虚假社交媒体资料的数据集进行了全面实验,以确定我们方法的效率。我们的研究结果表明,多数票技术超越了单个分类器,准确率达到 99.12%,精确率达到 99.12%,召回率达到 99.12%,F1 分数达到 99.12%。
{"title":"Detecting Fake Social Media Profiles Using the Majority Voting Approach","authors":"Dharmaraj R Patil, T. Pattewar, Vipul D. Punjabi, Shailendra M. Pardeshi","doi":"10.4108/eetsis.4264","DOIUrl":"https://doi.org/10.4108/eetsis.4264","url":null,"abstract":"INTRODUCTION: The rise of social media platforms has brought about a concerning surge in the creation of fraudulent user profiles, with intentions ranging from spreading false information and perpetrating fraud to engaging in cyberbullying. The detection of these deceptive profiles has emerged as a critical imperative to safeguard the trustworthiness and security of online communities.OBJECTIVES: This paper focused on the detection and identification of fake social media profiles.METHODS: This paper introduces an innovative approach for discerning and categorizing counterfeit social media profiles by leveraging the majority voting approach. The proposed methodology integrates a range of machine learning algorithms, including Decision Trees, XGBoost, Random Forest, Extra Trees, Logistic Regression, AdaBoost and K-Nearest Neighbors each tailored to capture distinct facets of user behavior and profile attributes. This amalgamation of diverse methods results in an ensemble of classifiers, which are subsequently subjected to a majority voting mechanism to render a conclusive judgment regarding the legitimacy of a given social media profile.RESULTS: We conducted thorough experiments using a dataset containing both legitimate and fake social media profiles to determine the efficiency of our methodology. Our findings substantiate that the Majority Voting Technique surpasses individual classifiers, attaining an accuracy rate of 99.12%, a precision rate of 99.12%, a recall rate of 99.12%, and an F1-score of 99.12%.CONCLUSION: The results show that the majority vote method is reliable for detecting and recognising fake social media profiles.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"62 35","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139778718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Fake Social Media Profiles Using the Majority Voting Approach 利用多数投票法检测虚假社交媒体资料
Pub Date : 2024-02-14 DOI: 10.4108/eetsis.4264
Dharmaraj R Patil, T. Pattewar, Vipul D. Punjabi, Shailendra M. Pardeshi
INTRODUCTION: The rise of social media platforms has brought about a concerning surge in the creation of fraudulent user profiles, with intentions ranging from spreading false information and perpetrating fraud to engaging in cyberbullying. The detection of these deceptive profiles has emerged as a critical imperative to safeguard the trustworthiness and security of online communities.OBJECTIVES: This paper focused on the detection and identification of fake social media profiles.METHODS: This paper introduces an innovative approach for discerning and categorizing counterfeit social media profiles by leveraging the majority voting approach. The proposed methodology integrates a range of machine learning algorithms, including Decision Trees, XGBoost, Random Forest, Extra Trees, Logistic Regression, AdaBoost and K-Nearest Neighbors each tailored to capture distinct facets of user behavior and profile attributes. This amalgamation of diverse methods results in an ensemble of classifiers, which are subsequently subjected to a majority voting mechanism to render a conclusive judgment regarding the legitimacy of a given social media profile.RESULTS: We conducted thorough experiments using a dataset containing both legitimate and fake social media profiles to determine the efficiency of our methodology. Our findings substantiate that the Majority Voting Technique surpasses individual classifiers, attaining an accuracy rate of 99.12%, a precision rate of 99.12%, a recall rate of 99.12%, and an F1-score of 99.12%.CONCLUSION: The results show that the majority vote method is reliable for detecting and recognising fake social media profiles.
引言:随着社交媒体平台的兴起,创建虚假用户配置文件的现象激增,其意图从传播虚假信息、实施欺诈到参与网络欺凌,令人担忧。要保障网络社区的可信度和安全性,检测这些欺骗性档案已成为当务之急:方法:本文介绍了一种创新方法,利用多数投票法对假冒社交媒体资料进行辨别和分类。所提出的方法整合了一系列机器学习算法,包括决策树、XGBoost、随机森林、额外树、逻辑回归、AdaBoost 和 K-Nearest Neighbors,每种算法都是为捕捉用户行为和个人资料属性的不同方面而量身定制的。结果:我们使用包含合法和虚假社交媒体资料的数据集进行了全面实验,以确定我们方法的效率。我们的研究结果表明,多数票技术超越了单个分类器,准确率达到 99.12%,精确率达到 99.12%,召回率达到 99.12%,F1 分数达到 99.12%。
{"title":"Detecting Fake Social Media Profiles Using the Majority Voting Approach","authors":"Dharmaraj R Patil, T. Pattewar, Vipul D. Punjabi, Shailendra M. Pardeshi","doi":"10.4108/eetsis.4264","DOIUrl":"https://doi.org/10.4108/eetsis.4264","url":null,"abstract":"INTRODUCTION: The rise of social media platforms has brought about a concerning surge in the creation of fraudulent user profiles, with intentions ranging from spreading false information and perpetrating fraud to engaging in cyberbullying. The detection of these deceptive profiles has emerged as a critical imperative to safeguard the trustworthiness and security of online communities.OBJECTIVES: This paper focused on the detection and identification of fake social media profiles.METHODS: This paper introduces an innovative approach for discerning and categorizing counterfeit social media profiles by leveraging the majority voting approach. The proposed methodology integrates a range of machine learning algorithms, including Decision Trees, XGBoost, Random Forest, Extra Trees, Logistic Regression, AdaBoost and K-Nearest Neighbors each tailored to capture distinct facets of user behavior and profile attributes. This amalgamation of diverse methods results in an ensemble of classifiers, which are subsequently subjected to a majority voting mechanism to render a conclusive judgment regarding the legitimacy of a given social media profile.RESULTS: We conducted thorough experiments using a dataset containing both legitimate and fake social media profiles to determine the efficiency of our methodology. Our findings substantiate that the Majority Voting Technique surpasses individual classifiers, attaining an accuracy rate of 99.12%, a precision rate of 99.12%, a recall rate of 99.12%, and an F1-score of 99.12%.CONCLUSION: The results show that the majority vote method is reliable for detecting and recognising fake social media profiles.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"36 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139838573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliability and Mean Time to System Failure of a Parallel System' by Using One or Two Decimal Random Data Points 使用一个或两个十进制随机数据点 "并行系统的可靠性和系统平均故障时间
Pub Date : 2024-02-08 DOI: 10.4108/eetsis.5071
H. Kaur, S. K. Sharma
Focusing on Weibull failure rules, which govern the stopping of components, this work evaluates reliability metrics such as stability and the mean time to system failure (MTSF) of a structure that is parallel. These metrics' behaviour has been seen for one or two decimal random values of component failure rates, operation times, form parameters, and the total quantity of components used in the parallel structure. In order to analyze the variation in the ethics of reliability as well as MTSF, the particular case of the Weibull distribution has also been taken up.
这项工作以控制组件停机的 Weibull 故障规则为重点,评估了并联结构的稳定性和系统平均故障时间(MTSF)等可靠性指标。在并联结构中使用的组件故障率、运行时间、形式参数和组件总量的一到两个十进制随机值的情况下,这些指标的行为都是可见的。为了分析可靠性伦理和 MTSF 的变化,我们还研究了 Weibull 分布的特殊情况。
{"title":"Reliability and Mean Time to System Failure of a Parallel System' by Using One or Two Decimal Random Data Points","authors":"H. Kaur, S. K. Sharma","doi":"10.4108/eetsis.5071","DOIUrl":"https://doi.org/10.4108/eetsis.5071","url":null,"abstract":"Focusing on Weibull failure rules, which govern the stopping of components, this work evaluates reliability metrics such as stability and the mean time to system failure (MTSF) of a structure that is parallel. These metrics' behaviour has been seen for one or two decimal random values of component failure rates, operation times, form parameters, and the total quantity of components used in the parallel structure. In order to analyze the variation in the ethics of reliability as well as MTSF, the particular case of the Weibull distribution has also been taken up.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":" 27","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139792830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Removing Coding and Inter Pixel Redundancy in Image Compression 消除图像压缩中的编码和像素间冗余
Pub Date : 2024-02-08 DOI: 10.4108/eetsis.5073
A. S, K. J.
The digital image plays an important role in today’s digital world. Storing and transmitting digital images efficiently is a challenging job. There are lots of techniques for reducing the size of digital pictures. This paper adapts the following method. The digital technique is separated into high and low resolutions. The low intensity and high intensity pixels single-handedly is dense and decompressed using three diverse algorithms to hit upon out the occurrence of low down intensity pixels in the picture. Totally six algorithms are experienced by means of benchmark images and the most excellent scheme is selected for concluding compression. A Comparison is made between the results obtained using these techniques and those obtained using JPEG 2000.
数字图像在当今的数字世界中扮演着重要角色。有效地存储和传输数字图像是一项具有挑战性的工作。缩小数字图像尺寸的技术有很多。本文采用了以下方法。数字技术分为高分辨率和低分辨率。使用三种不同的算法对低强度和高强度像素进行单个密集和解压缩,以消除图片中出现的低强度像素。通过基准图像体验了总共六种算法,最后选择了最优秀的方案进行压缩。使用这些技术获得的结果与使用 JPEG 2000 获得的结果进行了比较。
{"title":"Removing Coding and Inter Pixel Redundancy in Image Compression","authors":"A. S, K. J.","doi":"10.4108/eetsis.5073","DOIUrl":"https://doi.org/10.4108/eetsis.5073","url":null,"abstract":"The digital image plays an important role in today’s digital world. Storing and transmitting digital images efficiently is a challenging job. There are lots of techniques for reducing the size of digital pictures. This paper adapts the following method. The digital technique is separated into high and low resolutions. The low intensity and high intensity pixels single-handedly is dense and decompressed using three diverse algorithms to hit upon out the occurrence of low down intensity pixels in the picture. Totally six algorithms are experienced by means of benchmark images and the most excellent scheme is selected for concluding compression. A Comparison is made between the results obtained using these techniques and those obtained using JPEG 2000.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":" 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139792336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Removing Coding and Inter Pixel Redundancy in Image Compression 消除图像压缩中的编码和像素间冗余
Pub Date : 2024-02-08 DOI: 10.4108/eetsis.5073
A. S, K. J.
The digital image plays an important role in today’s digital world. Storing and transmitting digital images efficiently is a challenging job. There are lots of techniques for reducing the size of digital pictures. This paper adapts the following method. The digital technique is separated into high and low resolutions. The low intensity and high intensity pixels single-handedly is dense and decompressed using three diverse algorithms to hit upon out the occurrence of low down intensity pixels in the picture. Totally six algorithms are experienced by means of benchmark images and the most excellent scheme is selected for concluding compression. A Comparison is made between the results obtained using these techniques and those obtained using JPEG 2000.
数字图像在当今的数字世界中扮演着重要角色。有效地存储和传输数字图像是一项具有挑战性的工作。缩小数字图像尺寸的技术有很多。本文采用了以下方法。数字技术分为高分辨率和低分辨率。使用三种不同的算法对低强度和高强度像素进行单个密集和解压缩,以消除图片中出现的低强度像素。通过基准图像体验了总共六种算法,最后选择了最优秀的方案进行压缩。使用这些技术获得的结果与使用 JPEG 2000 获得的结果进行了比较。
{"title":"Removing Coding and Inter Pixel Redundancy in Image Compression","authors":"A. S, K. J.","doi":"10.4108/eetsis.5073","DOIUrl":"https://doi.org/10.4108/eetsis.5073","url":null,"abstract":"The digital image plays an important role in today’s digital world. Storing and transmitting digital images efficiently is a challenging job. There are lots of techniques for reducing the size of digital pictures. This paper adapts the following method. The digital technique is separated into high and low resolutions. The low intensity and high intensity pixels single-handedly is dense and decompressed using three diverse algorithms to hit upon out the occurrence of low down intensity pixels in the picture. Totally six algorithms are experienced by means of benchmark images and the most excellent scheme is selected for concluding compression. A Comparison is made between the results obtained using these techniques and those obtained using JPEG 2000.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"2 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139852114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on artificial intelligence machine translation based on BP neural algorithm 基于 BP 神经算法的人工智能机器翻译研究
Pub Date : 2024-02-08 DOI: 10.4108/eetsis.5075
Yan Wang
The primary focus of artificial intelligence advancement is in machine translation; nonetheless, a prevalent issue persists in the form of imprecise translation. The current challenge faced by artificial intelligence is to effectively executing machine translation from extensive datasets. This research presents a BP neural method that aims to repeatedly analyse translation data and achieve optimisation in machine translation. The findings indicate that the use of BP neural network may enhance the dependability and precision of machine translation, with an accuracy rate over 84%. This performance surpasses that of the online translation approach. Hence, it can be inferred that the use of BP neural algorithms has the potential to fulfil the requirements of machine translation and enhance the precision of online translation conducted by humans.
人工智能发展的主要重点是机器翻译;然而,一个普遍存在的问题是翻译不精确。人工智能目前面临的挑战是如何从大量数据集中有效地执行机器翻译。本研究提出了一种 BP 神经方法,旨在反复分析翻译数据,实现机器翻译的优化。研究结果表明,使用 BP 神经网络可以提高机器翻译的可靠性和准确性,准确率超过 84%。这一性能超过了在线翻译方法。因此,可以推断使用 BP 神经算法有可能满足机器翻译的要求,并提高人工在线翻译的精确度。
{"title":"Research on artificial intelligence machine translation based on BP neural algorithm","authors":"Yan Wang","doi":"10.4108/eetsis.5075","DOIUrl":"https://doi.org/10.4108/eetsis.5075","url":null,"abstract":"The primary focus of artificial intelligence advancement is in machine translation; nonetheless, a prevalent issue persists in the form of imprecise translation. The current challenge faced by artificial intelligence is to effectively executing machine translation from extensive datasets. This research presents a BP neural method that aims to repeatedly analyse translation data and achieve optimisation in machine translation. The findings indicate that the use of BP neural network may enhance the dependability and precision of machine translation, with an accuracy rate over 84%. This performance surpasses that of the online translation approach. Hence, it can be inferred that the use of BP neural algorithms has the potential to fulfil the requirements of machine translation and enhance the precision of online translation conducted by humans.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":" 16","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139791353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on artificial intelligence machine translation based on BP neural algorithm 基于 BP 神经算法的人工智能机器翻译研究
Pub Date : 2024-02-08 DOI: 10.4108/eetsis.5075
Yan Wang
The primary focus of artificial intelligence advancement is in machine translation; nonetheless, a prevalent issue persists in the form of imprecise translation. The current challenge faced by artificial intelligence is to effectively executing machine translation from extensive datasets. This research presents a BP neural method that aims to repeatedly analyse translation data and achieve optimisation in machine translation. The findings indicate that the use of BP neural network may enhance the dependability and precision of machine translation, with an accuracy rate over 84%. This performance surpasses that of the online translation approach. Hence, it can be inferred that the use of BP neural algorithms has the potential to fulfil the requirements of machine translation and enhance the precision of online translation conducted by humans.
人工智能发展的主要重点是机器翻译;然而,一个普遍存在的问题是翻译不精确。人工智能目前面临的挑战是如何从大量数据集中有效地执行机器翻译。本研究提出了一种 BP 神经方法,旨在反复分析翻译数据,实现机器翻译的优化。研究结果表明,使用 BP 神经网络可以提高机器翻译的可靠性和准确性,准确率超过 84%。这一性能超过了在线翻译方法。因此,可以推断使用 BP 神经算法有可能满足机器翻译的要求,并提高人工在线翻译的精确度。
{"title":"Research on artificial intelligence machine translation based on BP neural algorithm","authors":"Yan Wang","doi":"10.4108/eetsis.5075","DOIUrl":"https://doi.org/10.4108/eetsis.5075","url":null,"abstract":"The primary focus of artificial intelligence advancement is in machine translation; nonetheless, a prevalent issue persists in the form of imprecise translation. The current challenge faced by artificial intelligence is to effectively executing machine translation from extensive datasets. This research presents a BP neural method that aims to repeatedly analyse translation data and achieve optimisation in machine translation. The findings indicate that the use of BP neural network may enhance the dependability and precision of machine translation, with an accuracy rate over 84%. This performance surpasses that of the online translation approach. Hence, it can be inferred that the use of BP neural algorithms has the potential to fulfil the requirements of machine translation and enhance the precision of online translation conducted by humans.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"91 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139851248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliability and Mean Time to System Failure of a Parallel System' by Using One or Two Decimal Random Data Points 使用一个或两个十进制随机数据点 "并行系统的可靠性和系统平均故障时间
Pub Date : 2024-02-08 DOI: 10.4108/eetsis.5071
H. Kaur, S. K. Sharma
Focusing on Weibull failure rules, which govern the stopping of components, this work evaluates reliability metrics such as stability and the mean time to system failure (MTSF) of a structure that is parallel. These metrics' behaviour has been seen for one or two decimal random values of component failure rates, operation times, form parameters, and the total quantity of components used in the parallel structure. In order to analyze the variation in the ethics of reliability as well as MTSF, the particular case of the Weibull distribution has also been taken up.
这项工作以控制组件停机的 Weibull 故障规则为重点,评估了并联结构的稳定性和系统平均故障时间(MTSF)等可靠性指标。在并联结构中使用的组件故障率、运行时间、形式参数和组件总量的一到两个十进制随机值的情况下,这些指标的行为都是可见的。为了分析可靠性伦理和 MTSF 的变化,我们还研究了 Weibull 分布的特殊情况。
{"title":"Reliability and Mean Time to System Failure of a Parallel System' by Using One or Two Decimal Random Data Points","authors":"H. Kaur, S. K. Sharma","doi":"10.4108/eetsis.5071","DOIUrl":"https://doi.org/10.4108/eetsis.5071","url":null,"abstract":"Focusing on Weibull failure rules, which govern the stopping of components, this work evaluates reliability metrics such as stability and the mean time to system failure (MTSF) of a structure that is parallel. These metrics' behaviour has been seen for one or two decimal random values of component failure rates, operation times, form parameters, and the total quantity of components used in the parallel structure. In order to analyze the variation in the ethics of reliability as well as MTSF, the particular case of the Weibull distribution has also been taken up.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"32 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139852583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-Time Monitoring of Data Pipelines: Exploring and Experimentally Proving that the Continuous Monitoring in Data Pipelines Reduces Cost and Elevates Quality 数据管道的实时监控:探索和实验证明数据管道中的持续监控可降低成本并提高质量
Pub Date : 2024-02-07 DOI: 10.4108/eetsis.5065
Shammy Narayanan, Maheswari S, Prisha Zephan
Data pipelines are crucial for processing and transforming data in various domains, including finance, healthcare, and e-commerce. Ensuring the reliability and accuracy of data pipelines is of utmost importance to maintain data integrity and make informed business decisions. In this paper, we explore the significance of continuous monitoring in data pipelines and its contribution to data observability. This work discusses the challenges associated with monitoring data pipelines in real-time, propose a framework for real-time monitoring, and highlight its benefits in enhancing data observability. The findings of this work emphasize the need for organizations to adopt continuous monitoring practices to ensure data quality, detect anomalies, and improve overall system performance.
数据管道对于金融、医疗保健和电子商务等各个领域的数据处理和转换至关重要。确保数据管道的可靠性和准确性对于维护数据完整性和做出明智的业务决策至关重要。在本文中,我们将探讨数据管道中持续监控的意义及其对数据可观测性的贡献。这项工作讨论了与实时监控数据管道相关的挑战,提出了一个实时监控框架,并强调了其在增强数据可观察性方面的优势。这项工作的发现强调了企业采用持续监控实践的必要性,以确保数据质量、检测异常情况并提高整体系统性能。
{"title":"Real-Time Monitoring of Data Pipelines: Exploring and Experimentally Proving that the Continuous Monitoring in Data Pipelines Reduces Cost and Elevates Quality","authors":"Shammy Narayanan, Maheswari S, Prisha Zephan","doi":"10.4108/eetsis.5065","DOIUrl":"https://doi.org/10.4108/eetsis.5065","url":null,"abstract":"Data pipelines are crucial for processing and transforming data in various domains, including finance, healthcare, and e-commerce. Ensuring the reliability and accuracy of data pipelines is of utmost importance to maintain data integrity and make informed business decisions. In this paper, we explore the significance of continuous monitoring in data pipelines and its contribution to data observability. This work discusses the challenges associated with monitoring data pipelines in real-time, propose a framework for real-time monitoring, and highlight its benefits in enhancing data observability. The findings of this work emphasize the need for organizations to adopt continuous monitoring practices to ensure data quality, detect anomalies, and improve overall system performance.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"268 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139857522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Position information visualization analysis and personalized recommendation based on ant colony 基于蚁群的位置信息可视化分析和个性化推荐
Pub Date : 2024-02-07 DOI: 10.4108/eetsis.5061
Ling Xin, Bin Zhou, Pan Liu
With the rapid development of network technology, online recruitment and job hunting have become an important way of job hunting at present, but job seekers spend a lot of time looking for suitable positions in the face of massive job information. Traditional artificial selection of job information is difficult to solve the problem of job seekers finding suitable positions quickly and accurately. This article is based on ant colony algorithm for visual analysis and personalized recommendation of job information. Through visual analysis of massive job information on the network, personalized recommendations are made based on job seekers' professional, skill, behavior, and other information. A visual analysis and personalized recommendation system for job information is established, and recommendation accuracy, efficiency, and recall rate are evaluated and analyzed using recommendation theory, realize comprehensive evaluation of information visualization analysis and personalized recommendation quality of position information based on ant colony algorithm. Compared with artificial selection of position information, it is fast and highly matched.
随着网络技术的飞速发展,网络招聘和求职已成为当前求职的重要方式,但面对海量的招聘信息,求职者要花费大量的时间去寻找合适的岗位。传统的人工选择职位信息的方式难以解决求职者快速准确找到合适职位的问题。本文基于蚁群算法对招聘信息进行可视化分析和个性化推荐。通过对网络上的海量职位信息进行可视化分析,根据求职者的专业、技能、行为等信息进行个性化推荐。建立了职位信息可视化分析与个性化推荐系统,并利用推荐理论对推荐准确率、效率和召回率进行了评价和分析,实现了基于蚁群算法的职位信息可视化分析与个性化推荐质量的综合评价。与人工选择职位信息相比,具有速度快、匹配度高等特点。
{"title":"Position information visualization analysis and personalized recommendation based on ant colony","authors":"Ling Xin, Bin Zhou, Pan Liu","doi":"10.4108/eetsis.5061","DOIUrl":"https://doi.org/10.4108/eetsis.5061","url":null,"abstract":"With the rapid development of network technology, online recruitment and job hunting have become an important way of job hunting at present, but job seekers spend a lot of time looking for suitable positions in the face of massive job information. Traditional artificial selection of job information is difficult to solve the problem of job seekers finding suitable positions quickly and accurately. This article is based on ant colony algorithm for visual analysis and personalized recommendation of job information. Through visual analysis of massive job information on the network, personalized recommendations are made based on job seekers' professional, skill, behavior, and other information. A visual analysis and personalized recommendation system for job information is established, and recommendation accuracy, efficiency, and recall rate are evaluated and analyzed using recommendation theory, realize comprehensive evaluation of information visualization analysis and personalized recommendation quality of position information based on ant colony algorithm. Compared with artificial selection of position information, it is fast and highly matched.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"58 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139857178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ICST Transactions on Scalable Information Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1